Prevention of Multiple Wireless Spoofing Attack Protocols

Download Now
Provided by: ISR JOURNALS
Topic: Security
Format: PDF
Wireless networks are vulnerable to spoofing attacks which allows for many other forms of attacks on the networks. The identity of node can be verified through cryptography authentication scheme, this authentication scheme is not always desirable because it requires key management and additional infrastructure overhead. In this paper, the author proposed to use spatial information, physical property associated with each wireless node that is hard to falsify not based on cryptography authentication scheme, as basis for detecting spoofing attacks, determining the number of spoofing attackers when multiple attackers use same node identity and localizing multiple attackers.
Download Now

Find By Topic